USA media coverage.
December 29, 2023
Qualys CEO on Global Cloud Demand, Rising Cyber Risks, and AI
CNBCDecember 22, 2023
Google Flags 8th Chrome Zero-Day of the Year
Gov InfoSecurityDecember 22, 2023
Google Flags 8th Chrome Zero-Day of the Year
Bank Info SecurityDecember 22, 2023
Google Flags 8th Chrome Zero-Day of the Year
DataBreachTodayDecember 22, 2023
Google Releases Eighth Zero-Day Patch of 2023 for Chrome
Dark ReadingDecember 21, 2023
Qualys Releases Annual Review of CVEs in 2023
Focus on ITDecember 21, 2023
Google Releases Emergency Patches for Eighth Chrome Zero-Day of 2023
SC MagazineDecember 19, 2023
Slow Patching Exacts a Price
The Wall Street JournalDecember 19, 2023
Top cybersecurity predictions of 2024
Security MagazineDecember 19, 2023
Cybersecurity Predictions for 2024: 5 Trends to Watch
Dice InsightsDecember 19, 2023
How States Help Municipalities Build Their Cyber Defenses
Dark ReadingDecember 18, 2023
1 in 4 high-risk CVEs are exploited within 24 hours of going public
SC MediaDecember 18, 2023
Report: Attackers Move Lightning Fast to Capitalize on Vulnerabilities
SecureWorldDecember 18, 2023
Report Says CISA is Failing to Identify High-Risk Exploits
Gov InfoSecurityDecember 18, 2023
Majority of 2023’s critical cyberattacks stemmed from fewer than 1% of vulnerabilities
SiliconANGLEDecember 17, 2023
Cloudflare report: Log4j remains top target for attacks in 2023
CSODecember 14, 2023
Patch Now: Exploit Activity Mounts for Dangerous Apache Struts 2 Bug
Dark ReadingDecember 14, 2023
China's Cyber Intrusions a Looming Threat to U.S. Critical Infrastructure
SecureWorldDecember 13, 2023
CISA Cites Modest Progress in Reducing CVEs
Security BoulevardDecember 11, 2023
Critical Struts 2 flaw could result in remote code execution, says Apache
SC MediaDecember 12, 2023
Microsoft Gives Admins a Reprieve With Lighter-Than-Usual Patch Update
Dark ReadingDecember 11, 2023
The Gately Report: Qualys Partners Getting New Channel Program in Early 2024
Channel FuturesDecember 11, 2023
For CISOs in 2024, “Efficiency” Will Be the Keyword
VMblogDecember 8, 2023
Apple: 2.5B Records Exposed, Marking Staggering Surge in Data Breaches
Dark ReadingDecember 8, 2023
Trojan-Proxy Based on macOS Piggybacks on Cracked Software
SC MagazineDecember 7, 2023
Proxy Trojan Targets macOS Users for Traffic Redirection
Dark ReadingDecember 6, 2023
2024 Cybersecurity Predictions: Insights from Industry Experts
GLOBAL SECURITY MAGDecember 1, 2023
Top 9 Cybersecurity Trends in 2024
TechopediaNovember 30, 2023
Latest severe Chrome bug prompts CISA warning
The RecordNovember 29, 2023
Google Patches Another Chrome Zero-Day as Browser Attacks Mount
Dark ReadingNovember 29, 2023
Cyber Attack on Ardent Health Closes 3 of Its 30 Emergency Rooms
SecureWorldNovember 29, 2023
Google rolls out emergency update for Chrome after critical vulnerability found
Silicon AngleNovember 22, 2023
Flaw in Apache ActiveMQ Exposes Linux Systems to Kinsing Malware
InfosecurityNovember 21, 2023
Don't let CVEs distract you: Shift your AppSec team's focus to malware
ReversingLabsNovember 21, 2023
Kinsing malware exploits critical Apache ActiveMQ flaw to mine crypto
SC MediaNovember 21, 2023
CISA orders federal agencies to patch Looney Tunables Linux bug
Bleeping ComputerNovember 21, 2023
Don’t let CVEs distract you: Shift your AppSec team’s focus to malware
Security BoulevardNovember 21, 2023
CISA, NSA Issue Supply Chain Security Guidance Report
DevOps.comNovember 15, 2023
CSA Launches First Zero Trust Certification
InfosecurityNovember 13, 2023
Microsoft Zero-Days Allow Defender Bypass, Privilege Escalation
Dark ReadingNovember 14, 2023
CISA adds three Microsoft Patch Tuesday bugs to vulnerability list
The RecordNovember 12, 2023
Cyber risk is business risk: Qualys Enterprise TruRisk Platform sets new industry standard
Help Net SecurityNovember 10, 2023
Morgan Stanley Cybersecurity Director: Teams Need to Focus on Four Rs
Security BoulevardNovember 9, 2023
Cybersecurity Analyst Degree: What You Need to Know
Dice InsightsNovember 8, 2023
Qualys Unveils Risk Management Platform
Security BoulevardNovember 7, 2023
CVSS 4.0 Offers Significantly More Patching Context
Dark ReadingNovember 7, 2023
CVSS 4.0 Offers Significantly More Patching Context
Dark ReadingNovember 6, 2023
Kinsing Cyberattackers Debut 'Looney Tunables' Cloud Exploits
Dark ReadingNovember 2, 2023
CVSS 4.0 keys-in on threat intelligence metrics and OT, ICS and IoT
SC MagazineOctober 31, 2023
ServiceNow Misconfiguration Went Unexploited, But Still Cause for Concern
SC MagazineOctober 31, 2023
Malware mealkits, and other commodity criminal tools
CyberWireOctober 31, 2023
Qualys Announces TruRisk, FixIT and ProtectIT Packages in AWS Marketplace
Global Security MagOctober 31, 2023
Qualys Announces TruRisk, FixIT and ProtectIT Packages in AWS Marketplace
VMblogOctober 27, 2023
Cisco Security Bugs: How Network Managers Can Keep Track
Networking ComputerOctober 26, 2023
VMware Warns of Critical Vulnerability Affecting vCenter Server Product
The RecordOctober 25, 2023
Virtual Alarm: VMware Issues Major Security Advisory
Dark ReadingOctober 25, 2023
Salt Security: OAuth Implementation Flaw Could Lead to Account Takeover
Security BoulevardOctober 25, 2023
Grammarly says it corrected sign-in vulnerabilities after alert from cyber researchers
The RecordOctober 24, 2023
Flaws in OAuth’s social sign-in could have put billions of users at risk
SC MagazineOctober 22, 2023
Microsoft Vulnerabilities Top CISA’s List of Ransomware-Linked CVEs
Security BoulevardOctober 22, 2023
What the Cisco IOS XE zero-day reveals about potential risk management blind spots
SC MagazineOctober 19, 2023
Cisco IOS XE Attacks: 7 Biggest Unanswered Questions
CRNOctober 16, 2023
Why Cisco IOS XE Attacks Are Setting Off Alarm Bells
CRNOctober 17, 2023
More Than 34,000 Cisco Devices Compromised Via IOS XE Vulnerability: Researchers
CRNOctober 15, 2023
Cisco: Hackers targeting zero-day found in internet-exposed routers
The RecordOctober 15, 2023
New Cisco Web UI Vulnerability Exploited by Attackers
HackreadOctober 15, 2023
Cisco zero-day bug allows router hijacking and is being actively exploited
The RegisterOctober 15, 2023
Active Exploitation Discovered in Cisco IOS XE Software, Devices Vulnerable
Channel FuturesOctober 15, 2023
Cisco IOS XE Vulnerability: Here’s What To Know
CRNOctober 15, 2023
What federal agencies can learn from the MGM and Caesars cyberattacks
Federal TimesOctober 11, 2023
How to Scan Your Environment for Vulnerable Versions of Curl
Dark ReadingOctober 10, 2023
Nasty bug discovered in widely used Linux utility curl, and patches already rolled out
ZDNETOctober 10, 2023
GNOME Libcue Flaw is a Risk to Linux Systems
Security BoulevardOctober 10, 2023
From chaos to cadence: Celebrating two decades of Microsoft's Patch Tuesday
The RegisterOctober 9, 2023
Attacks on NetScaler Gateways aim for user credentials
SC MediaOctober 8, 2023
Looney Tunables' Linux Flaw Sees Snowballing Proof-of-Concept Exploits
Dark ReadingOctober 8, 2023
GNOME Linux systems exposed to RCE attacks via file downloads
Bleeping ComputerOctober 8, 2023
Maintainers Warn of Vulnerability Affecting Foundational Open-Source Tool
The RecordOctober 5, 2023
THIS WEEK IN SECURITY: LOONEY TUNABLES, NOT A 0-DAY*, AND CURL WARNING
HackadayOctober 5, 2023
Linux Distributions Impacted by High-Severity Glibc Bug
DecipherOctober 5, 2023
MULTIPLE EXPERTS RELEASED EXPLOITS FOR LINUX LOCAL PRIVILEGE ESCALATION FLAW LOONEY TUNABLES
Security AffairsOctober 4, 2023
Patch Now: This Serious Linux Vulnerability Affects Nearly All Distributions
ZDNETOctober 4, 2023
Malicious code execution likely with high-severity Linux bug
SC MediaOctober 3, 2023
‘Looney Tunables’ Linux Vulnerability Could Allow Threat Actors to Run Malicious Code
Silicon AngleOctober 3, 2023
Qualys Discovers Critical Linux Flaw ‘Looney Tunables’
Tech News WorldOctober 3, 2023
Looney Tunables Exploit Gives Hackers Root Access To Linux, That's All Folks
Hot HardwareOctober 2, 2023
Linux Vulnerability Exposes Millions of Systems to Attack
HackreadOctober 3, 2023
Looney Tunables' Bug Opens Millions of Linux Systems to Root Takeover
Dark ReadingOctober 3, 2023
Qualys Discovers Critical Linux Flaw ‘Looney Tunables’
Linux InsiderOctober 3, 2023
Severe Glibc Privilege Escalation Vulnerability Impacts Major Linux Distributions
Security WeekOctober 3, 2023
Looney Tunables: New Linux Flaw Enables Privilege Escalation on Major Distributions
The Hacker NewsSeptember 27, 2023
Department of Defense overhauls cyber strategy: Experts weigh in
Security MagazineOctober 2, 2023
New 'Looney Tunables' Linux Bug Gives Root on Major Distros
Bleeping ComputerSeptember 26, 2023
MOVEit Bug’s Ripple Effect Still Unfolding
DecipherSeptember 26, 2023
ShadowSyndicate suspected of being RaaS affiliate to several ransomware families
SC MediaSeptember 26, 2023
EPSS vs. CVSS: Exploit prediction could change the game on software risk management
Security BoulevardSeptember 21, 2023
BlueVoyant Partners with Qualys to launch comprehensive vulnerability identification service - Visibl for Qualys
ITWireSeptember 19, 2023
BlueVoyant, Qualys Partner for Vulnerability Management
MSSP AlertSeptember 13, 2023
What Is Vulnerability Management? Everything You Should Know
Enterprise Networking PlanetSeptember 17, 2023
Probe Reveals Previously Secret Israeli Spyware That Infects Targets via Ads
The RegisterAugust 28, 2023
FBI Dismantles Qakbot Botnet in Landmark Cyber Op
SecureWorldSeptember 14, 2023
Pro Take: MGM Casino Hack Shows Challenge in Defending Connected Tech
The Wall Street JournalSeptember 8, 2023
Apple issues 2 CVEs to patch zero-day flaws used to deliver Pegasus spyware
SC MagazineSeptember 8, 2023
Microsoft vulnerabilities make up 75% of top 20 exploited list
SDxCentralSeptember 12, 2023
Top 10 IT Asset Discovery Tools
Enterprise TalkSeptember 13, 2023
The Gately Report: Egnyte Partners Getting New Opportunities with Generative AI
Channel FuturesSeptember 13, 2023
CISA Issues Alert to Secure iPhones Against Pegasus Spyware Zero-Days
SecureWorldAugust 31, 2023
Industry Reactions to Qakbot Botnet Disruption: Feedback Friday
SecurityWeekAugust 7, 2023
Misconfigurations in major cloud offerings examined
SC MediaAugust 23, 2023
Cloud insecurity: leaving the keys in the door?
Security InsightsAugust 20, 2023
CISA Warns of Citrix ShareFile Vulnerability
Channel FuturesAugust 17, 2023
4 of the Biggest Vulnerabilities Talked About During Black Hat 2023
InformationWeekAugust 16, 2023
CISA Alert Warns of Citrix ShareFile Transfer Vulnerability
SecureWorldAugust 16, 2023
Qualys Offers Threat Forecast For Cloud, and Tips For Reducing Cloud Risks
Dark ReadingAugust 16, 2023
CISA adds Citrix ShareFile flaw to the KEV catalog
SC MediaAugust 14, 2023
New US Initiatives Aim To Better Defend Against Cyberattacks
Tech News WorldAugust 13, 2023
Microsoft, cloud security under the microscope with federal cyber review
Cybersecurity DiveAugust 10, 2023
Bugs in Codesys V3 SDK could cause RCE, DoS attacks on industrial facilities
SC MediaAugust 9, 2023
Black Hat USA: Cybersecurity Concerns Amid Big Techs’ AI, ChatGPT ‘Race’
Channel FuturesAugust 9, 2023
20 Hottest New Cybersecurity Tools At Black Hat 2023
CRNAugust 8, 2023
Joint Advisory Warns of Threat From IDOR Vulnerabilities
Security BoulevardAugust 6, 2023
Research Eyes Misconfiguration Issues At Google, Amazon and Microsoft Cloud
TechRepublicAugust 2, 2023
Phishing Campaign Exploited Salesforce Flaw to Attack Facebook Users
Security BoulevardAugust 2, 2023
Attackers Chain Salesforce and Facebook Flaws to Launch Phishing Attacks
SC MediaAugust 2, 2023
These Are the Top Five Cloud Security Risks, Qualys Says
SecurityWeekAugust 1, 2023
Report Reveals Alarming Cloud Misconfiguration and Exposed Assets
Enterprise Security TechAugust 1, 2023
Managed Security Services Provider (MSSP) Market News: 2 August 2023
MSSP AlertAugust 1, 2023
Qualys Report: Cloud Misconfiguration Critical Issue in Cloud Security Environments
Channel FuturesAugust 1, 2023
Mazars, Qualys to Expand Managed Cybersecurity Services
Channel Vision MagJuly 31, 2023
Experts Sound Alarm on Critical Cloud Security Risks
SecureWorldJuly 31, 2023
Qualys Research Finds 57% of Azure and 60% of Google Cloud Deployments Fail CIS Benchmarks
VMblogJuly 31, 2023
Cloud Tech Debt Puts Millions of Apps at Risk, Says New Report
InfosecurityJuly 31, 2023
Over half of Azure and Google Cloud deployments fail CIS benchmarks
BetaNewsJuly 23, 2023
Qualys CEO on Vulnerability, Patch Management Needs of SMBs
Gov InfoSecurityJuly 23, 2023
Qualys CEO on Vulnerability, Patch Management Needs of SMBs
BankInfoSecurityJuly 17, 2023
Exploited 0-days, an incomplete fix, and a botched disclosure: Infosec snafu reigns
Ars TechnicaJuly 10, 2023
Managed Security Services Provider (MSSP) Market News: 10 July 2023
MSSP AlertJuly 10, 2023
How EPSS 3.0 is an improvement over previous versions of the threat assessment system
CSOJune 19, 2023
What The Board Needs To Know
The Wall Street JournalJune 27, 2023
Hundreds of federal network devices fail new CISA security requirements
SC MediaMay 14, 2023
2023 SC Awards Finalists: Best Risk/Policy Management Solution
SC MediaApril 27, 2023
Cowbell Delivers Qualys External Attack Surface Management Intelligence Feed
MSSP AlertApril 27, 2023
Qualys and Cowbell Expand Partnership
Cyber Risk LeadersApril 27, 2023
5 Channel Partner & MSP News Updates for 27 April 2023
Channel E2EApril 20, 2023
CISA warns of OS Command Injection vulnerability in INEA ME RTU hardware
Industrial CyberApril 11, 2023
Data-backed insights for future-proof cybersecurity strategies
Help Net SecurityApril 11, 2023
Microsoft (& Apple) Patch Tuesday, April 2023 Edition
Krebs on SecurityApril 11, 2023
Windows CLFS Vulnerability Used for Ransomware Attacks
E Security PlanetApril 10, 2023
CISA adds Microsoft, Apple bugs to exploited vulnerabilities catalog
The RecordApril 5, 2023
Best Practices to Pass an IT Security Audit
Bank Info SecurityMarch 27, 2023
Qualys Threat Research Unit (TRU) Launches 2023 TruRisk Research Report
VMblogMarch 27, 2023
Managed Security Services Provider (MSSP) Market News: 28 March 2023
MSSP AlertMarch 26, 2023
Next-Gen CISO: The Custodian of Digital Trust
Bank Info SecurityMarch 22, 2023
More victims emerge from Fortra GoAnywhere zero-day attacks
TechTargetMarch 20, 2023
CISA kicks off ransomware vulnerability pilot to help spot ransomware-exploitable flaws
CSOMarch 16, 2023
Old Threats, New Access: The Danger of Old Vulnerabilities
Solutions ReviewMarch 16, 2023
Microsoft Outlook Warning: Critical New Email Exploit Triggers Automatically—Update Now
ForbesMarch 13, 2023
Cloud Security Market Q&A With Parag Bajaria of Qualys
DatamationMarch 10, 2023
5 steps to gain control of vulnerability management for your enterprise
VentureBeatMarch 9, 2023
Best Enterprise Vulnerability Scanning Vendors
eSecurity PlanetMarch 2, 2023
Vulnerability Management: Definition, Process & Tools
E Security PlanetMarch 1, 2023
Wire19’s listing of top 100 CIOs of IT organizations in the US
Wire19February 14, 2023
Qualys extends cloud security support to include macOS devices
SC MediaFebruary 9, 2023
Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritize and Reduce Risk
AiThorityFebruary 6, 2023
OpenSSH Releases Patch for New Pre-Auth Double Free Vulnerability
The Hacker NewsFebruary 1, 2023
Qualys Releases FedRAMP-Ready Cybersecurity Platform
MSSP AlertFebruary 1, 2023
Qualys Introduces GovCloud
DevOps DigestFebruary 1, 2023
Qualys Introduces GovCloud, a FedRAMP Ready (High Impact Level) Cybersecurity Platform
AiThorityJanuary 31, 2023
The 20 Coolest Cloud Security Companies Of The 2023 Cloud 100
CRNJanuary 23, 2023
Threat Actors Turn to Sliver as Open Source Alternative to Popular C2 Frameworks
The Hacker NewsJanuary 18, 2023
Open Source 2022 Wins and Losses
Linux InsiderJanuary 17, 2023
5 Vulnerability Scanning Case Studies
DatamationJanuary 13, 2023
Microsoft Releases a High January Patchload for the Second Year
SpiceworksJanuary 12, 2023
CISA adds recently-announced Microsoft zero-day to exploited vulnerability catalog
The RecordJanuary 11, 2023
Microsoft Patch Tuesday Fixes 11 Critical Vulnerabilities, One Zero-Day
E Security PlanetJanuary 10, 2023
12 Top Vulnerability Management Tools for 2023
E Security PlanetJanuary 11, 2023
Microsoft Issues January 2023 Patch Tuesday Updates, Warns of Zero-Day Exploit
The Hacker NewsJanuary 9, 2023
Security Teams Failing to Address Open Source Vulnerabilities
Security BoulevardJanuary 4, 2023
Blind Eagle Hackers Return with Refined Tools and Sophisticated Infection Chain
The Hacker NewsJanuary 3, 2023
New malware campaign using stolen bank info as phishing bait
SC MediaJanuary 3, 2023
Attackers use stolen banking data as phishing lure to deploy BitRAT
CSOJanuary 3, 2023
Cyber Security Headlines: FTX founder pleads not guilty, LA housing authority cyberattack, Ukrainian vishing operation bust
CISO SeriesJanuary 3, 2023
BitRat Malware Gnaws at Victims With Bank Heist Data
Dark ReadingJanuary 2, 2023
BitRAT malware campaign uses stolen bank data for phishing
Bleeping ComputerJanuary 2, 2023
Hackers Using Stolen Bank Information to Trick Victims into Downloading BitRAT Malware
The Hacker NewsFollow us on social media